SmarterTools SmarterMail < Build 9511 Authentication Bypass via Password Reset API
Description
SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.smartertools.com/smartermail/release-notes/currentmitrerelease-notespatch
- labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/mitretechnical-descriptionexploit
- code-white.com/public-vulnerability-list/mitrethird-party-advisory
- www.vulncheck.com/advisories/smartertools-smartermail-authentication-bypass-via-password-reset-apimitrethird-party-advisory
News mentions
0No linked articles in our index yet.